Managing Certificates
794
Red Hat Certificate System Administrator’s Guide • September 2005
Figure J-10
A Certificate Chain That Can’t Be Verified
For general information about the way digital signatures work, see “Digital Signatures,”
which begins on page 772.
”
For a more detailed description of the signature verification
process in the context of SSL client and server authentication, see Appendix K,
“Introduction to SSL.”
Managing Certificates
The set of standards and services that facilitate the use of public-key cryptography and
X.509 v3 certificates in a network environment is called the
public key infrastructure
(PKI).
PKI management is complex topic beyond the scope of this document. The sections that
follow introduce some of the specific certificate management issues addressed by Red Hat
products.
•
Issuing Certificates
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...